{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:00:16Z","timestamp":1775754016302,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10676-019-09508-z","type":"journal-article","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T10:02:53Z","timestamp":1563357773000},"page":"307-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2848-5305","authenticated-orcid":false,"given":"Marcel","family":"Becker","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,17]]},"reference":[{"issue":"6239","key":"9508_CR1","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1126\/science.aaa1160","volume":"348","author":"E Bakshy","year":"2015","unstructured":"Bakshy, E., Messing, S., & Adamic, L. (2015). Exposure to ideologically diverse news and opinion on Facebook. Science,348(6239), 1130\u20131132.","journal-title":"Science"},{"key":"9508_CR2","volume-title":"Ethiek van de digitale Media","author":"M Becker","year":"2015","unstructured":"Becker, M. (2015). Ethiek van de digitale Media. Amsterdam: Boom."},{"key":"9508_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.4324\/9781315856865-3","volume-title":"Ethics in public policy and management: A global Research companion","author":"M Becker","year":"2015","unstructured":"Becker, M., & Talsma, J. (2015). Adding colours to the shades of grey: Enriching the integrity discourse with virtue ethics concepts. In A. Lawton, Z. Van der Wal, & L. Huberts (Eds.), Ethics in public policy and management: A global Research companion (pp. 33\u201349). London & New York: Routlegde."},{"key":"9508_CR8","first-page":"77","volume-title":"Ethical issues in journalism and the media","author":"A Belsey","year":"1992","unstructured":"Belsey, A. (1992). Privacy, publicity and politics. In A. Belsey & R. Chadwick (Eds.), Ethical issues in journalism and the media (pp. 77\u201392). London: Routledge."},{"key":"9508_CR4","volume-title":"Journalism as a practice: Macintyre, virtue ethics and the press","author":"S Borden","year":"2007","unstructured":"Borden, S. (2007). Journalism as a practice: Macintyre, virtue ethics and the press. Farnham: Ashgate."},{"key":"9508_CR5","volume-title":"It\u2019s complicated: The social Lives of networked Teens","author":"D Boyd","year":"2014","unstructured":"Boyd, D. (2014). It\u2019s complicated: The social Lives of networked Teens. New Haven, London: Yale University Press."},{"key":"9508_CR6","unstructured":"Criado, N., Such, J. M. (2015). Towards implicit contextual integrity. The Second International Workshop on Agents and CyberSecurity (ACySE), pp. 23\u201326."},{"issue":"6","key":"9508_CR7","doi-asserted-by":"crossref","first-page":"613","DOI":"10.4037\/ajcc2007.16.6.613","volume":"16","author":"L Day","year":"2007","unstructured":"Day, L. (2007). Courage as a virtue necessary to good nursing practice. American Journal of Critical Care,16(6), 613\u2013616.","journal-title":"American Journal of Critical Care"},{"issue":"5","key":"9508_CR9","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1080\/1369118X.2018.1428656","volume":"21","author":"E Dubois","year":"2018","unstructured":"Dubois, E., & Blank, G. (2018). The echo chamber is overstated: The moderating effect of political interest and diverse media. Information, Communication & Society,21(5), 729\u2013745.","journal-title":"Information, Communication & Society"},{"key":"9508_CR10","unstructured":"Esguerra, R. (2009). Google CEO Eric Schmidt dismisses the importance of privacy. Blog Posting. Electronic Frontier Foundation. Retrieved January 10, 2014 from https:\/\/www.eff.org\/deeplinks\/2009\/12\/google-ceo-eric-schmidt-dismisses-privacy ."},{"key":"9508_CR11","unstructured":"European Data Protection Supervisor (EDPS) Opinion 4\/2015 \u2018Towards a new digital Ethics\u2019."},{"issue":"38","key":"9508_CR12","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1073\/pnas.1414626111","volume":"111","author":"S Fiske","year":"2014","unstructured":"Fiske, S., & Hauser, R. M. (2014). Protecting human research participants in the age of big data. PNAS,111(38), 1375\u20131376.","journal-title":"PNAS"},{"key":"9508_CR13","volume-title":"Surveiller et Punir. Naissance de la Prison","author":"M Foucault","year":"1975","unstructured":"Foucault, M. (1975). Surveiller et Punir. Naissance de la Prison. Paris: Gallimard."},{"key":"9508_CR14","unstructured":"Frost, R. (1914). Mending Wall. Poem in online collection. Retrieved March 13, 2014 from http:\/\/writing.upenn.edu\/~afilreis\/88\/frost-mending.html ."},{"key":"9508_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1111\/j.1083-6101.2009.01440.x","volume":"14","author":"G Garrett","year":"2009","unstructured":"Garrett, G. (2009). Echo chambers online? Politically motivated selective exposure among internet news users. Journal of Computer-mediated Communication,14, 265\u2013285.","journal-title":"Journal of Computer-mediated Communication"},{"key":"9508_CR16","unstructured":"Gavison, R. (1984). Privacy and the Limits of Law. In F. A. Schoemann (Eds.), Philosophical Dimensions of Privacy: An Anthology (pp. 347\u2013402). Cambridge: Cambridge University Press. (Repr. From Gavison, R. (1980). Privacy and the limits of law. The Yale Law Journal, 89(3), 421\u2013471)."},{"key":"9508_CR17","unstructured":"Guess, A., Brendan, N., Reifler, J. (2016). Selective exposure to misinformation: Evidence from the consumption of fake news during the 2016 U.S. presidential campaign. Paper European Research Council, https:\/\/www.dartmouth.edu\/~nyhan\/fake-news-2016.pdf ."},{"issue":"24","key":"9508_CR18","doi-asserted-by":"publisher","first-page":"8788","DOI":"10.1073\/pnas.1320040111","volume":"111","author":"ADI Kramer","year":"2014","unstructured":"Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. PNAS,111(24), 8788\u20138790.","journal-title":"PNAS"},{"key":"9508_CR19","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1017\/CBO9781107280557.010","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"A Lever","year":"2015","unstructured":"Lever, A. (2015). Privacy, democracy and freedom of expression. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 162\u2013183). Cambridge: Cambridge University Press."},{"issue":"1","key":"9508_CR20","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1111\/papa.12040","volume":"43","author":"A Marmor","year":"2015","unstructured":"Marmor, A. (2015). What is the right to privacy? Philosophy & Public Affairs,43(1), 4\u201326.","journal-title":"Philosophy & Public Affairs"},{"key":"9508_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1017\/CBO9781107280557.003","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"GT Marx","year":"2015","unstructured":"Marx, G. T. (2015). Coming to terms: The kaleidoscope of privacy and surveillance. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 32\u201349). Cambridge: Cambridge universiy Press."},{"key":"9508_CR22","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: Technology, policy and the integrity of social life","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, H. (2009). Privacy in context: Technology, policy and the integrity of social life. Stanford: Stanford University Press."},{"key":"9508_CR23","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1017\/CBO9781107280557.016","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"H Nissenbaum","year":"2015","unstructured":"Nissenbaum, H. (2015). Respect for context as a benchmark for privacy online: What it is and isn\u2019t. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 278\u2013302). Cambridge: Cambridge University Press."},{"key":"9508_CR24","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1017\/CBO9780511625138.013","volume-title":"Philosophical dimensions of privacy: An anthology","author":"J Rachels","year":"1984","unstructured":"Rachels, J. (1984). Why privacy is important. In F. A. Schoemann (Ed.), Philosophical dimensions of privacy: An anthology (pp. 290\u2013294). Cambridge: Cambridge University Press."},{"key":"9508_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1017\/CBO9781107280557.004","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"P Regan","year":"2015","unstructured":"Regan, P. (2015). Privacy and the common good: Revisited. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 50\u201370). Cambridge: Cambridge University Press."},{"key":"9508_CR26","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1017\/CBO9780511625138.014","volume-title":"Philosophical dimensions of privacy: An anthology","author":"J Reiman","year":"1984","unstructured":"Reiman, J. (1984). Privacy, intimacy and personhood. In F. A. Schoemann (Ed.), Philosophical dimensions of privacy: An anthology (pp. 300\u2013316). Cambridge: Cambridge University Press."},{"issue":"5","key":"9508_CR27","first-page":"20","volume":"30","author":"B Roessler","year":"2009","unstructured":"Roessler, B. (2009). De glazen samenleving en de waarde van privacy. Filosofie & Praktijk,30(5), 20\u201329.","journal-title":"Filosofie & Praktijk"},{"key":"9508_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/CBO9781107280557","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"B Roessler","year":"2015","unstructured":"Roessler, B., & Mokrosinska, D. (2015). Introduction. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 1\u20138). Cambridge: Cambridge University Press."},{"key":"9508_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1017\/CBO9781107280557.002","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"JB Rule","year":"2015","unstructured":"Rule, J. B. (2015). Privacy: The longue dur\u00e9e. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 11\u201331). Cambridge: Cambridge University Press."},{"key":"9508_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical dimensions of privacy: An anthology","author":"FA Schoeman","year":"1984","unstructured":"Schoeman, F. A. (1984). Privacy: Philosophical dimensions of the literature. In F. A. Schoemann (Ed.), Philosophical dimensions of privacy: An anthology (pp. 1\u201333). Cambridge: Cambridge University Press."},{"issue":"2","key":"9508_CR31","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1080\/13600834.2016.1184456","volume":"25","author":"J Schoonmaker","year":"2016","unstructured":"Schoonmaker, J. (2016). Proactive privacy for a driverless age. Information & Communications Technology Law,25(2), 96\u2013128.","journal-title":"Information & Communications Technology Law"},{"key":"9508_CR32","volume-title":"Ethics and excellence: Cooperation and integrity in business","author":"R Solomon","year":"1992","unstructured":"Solomon, R. (1992). Ethics and excellence: Cooperation and integrity in business. New York: Oxford University Press."},{"key":"9508_CR33","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1017\/CBO9781107280557.005","volume-title":"Social dimensions of privacy: Interdisciplinary perspectives","author":"DJ Solove","year":"2015","unstructured":"Solove, D. J. (2015). The meaning and value of privacy. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 71\u201382). Cambridge: Cambridge University Press."},{"key":"9508_CR34","volume-title":"Privacy, big data and the public good: Frameworks for engagement","author":"K Strandburg","year":"2014","unstructured":"Strandburg, K. (2014). Monitoring, datafication and consent: Legal approaches to privacy in the big data context. In J. Lane, V. Stodden, S. Bender, & H. Nissenbaum (Eds.), Privacy, big data and the public good: Frameworks for engagement. Cambridge: Cambridge University Press."},{"key":"9508_CR35","volume-title":"Republic 2.0","author":"C Sunstein","year":"2009","unstructured":"Sunstein, C. (2009). Republic 2.0. New Jersey: Princeton University Press."},{"key":"9508_CR36","volume-title":"Human agency and language: Philosophical papers 1","author":"C Taylor","year":"1999","unstructured":"Taylor, C. (1999). Human agency and language: Philosophical papers 1. Cambridge: Cambridge University Press."},{"issue":"4","key":"9508_CR37","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1111\/j.2041-6962.2002.tb01918.x","volume":"40","author":"JS Taylor","year":"2002","unstructured":"Taylor, J. S. (2002). Privacy and autonomy: A reappraisal. Southern Journal of Philosophy,40(4), 587\u2013604.","journal-title":"Southern Journal of Philosophy"},{"key":"9508_CR38","first-page":"186","volume-title":"The Routledge handbook of internet politics","author":"D Tewksbury","year":"2009","unstructured":"Tewksbury, D., & Rittenberg, J. (2009). Online news creation and consumption. Implication for modern democracies. In A. Chadwick & P. Howard (Eds.), The Routledge handbook of internet politics (pp. 186\u2013200). London: Routledge."},{"issue":"3","key":"9508_CR39","first-page":"230","volume":"5","author":"B van der Sloot","year":"2014","unstructured":"van der Sloot, B. (2014). Privacy as human flourishing: Could a shift towards virtue ethics strengthen privacy protection in the age of Big Data? Journal of Intellectual Property, Information Technology and Electronic Commerce Law,5(3), 230\u2013244.","journal-title":"Journal of Intellectual Property, Information Technology and Electronic Commerce Law"},{"key":"9508_CR40","doi-asserted-by":"publisher","first-page":"255","DOI":"10.24908\/ss.v12i2.4600","volume":"12","author":"M van Otterlo","year":"2014","unstructured":"van Otterlo, M. (2014). Automated experimentation in Walden 3.0: The next step in profiling, predicting, control and surveillance. Surveillance and Society,12, 255\u2013272.","journal-title":"Surveillance and Society"},{"key":"9508_CR41","volume-title":"Spheres of justice: A defence of pluralism and equality","author":"M Walzer","year":"1983","unstructured":"Walzer, M. (1983). Spheres of justice: A defence of pluralism and equality. Oxford: Blackwell."},{"issue":"5","key":"9508_CR42","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S Warren","year":"1890","unstructured":"Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(5), 193\u2013220.","journal-title":"Harvard Law Review"},{"key":"9508_CR43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165860","volume-title":"Moral luck","author":"B Williams","year":"1981","unstructured":"Williams, B. (1981). Persons, character and morality. In J. Rachels (Ed.), Moral luck. Cambridge: Cambridge University Press."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09508-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09508-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09508-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T01:42:53Z","timestamp":1610502173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09508-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,17]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9508"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09508-z","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,17]]},"assertion":[{"value":"17 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}